Prakhar Sood is currently a Senior Specialist Architect at Pramerica Systems Ireland, where he designs and manages teams working on CA identity and access management solutions. He has over 10 years of experience in identity and access management, previously working at CA Technologies, SDG Corporation, and TCS. His expertise includes implementing and customizing solutions from CA, Oracle, PingFederate, and ForgeRock.
Silviu Trofimov is an experienced information security professional with expertise in identity and access management, network security, cryptography, and data protection. He has over 20 years of experience designing and implementing security solutions for organizations. His technical skills include identity management, firewall management, PKI, next generation firewalls, and database security. He holds multiple security certifications.
Derek Mezack is an experienced security professional seeking a versatile role involving research, development, and training. He has extensive experience developing security solutions like SIEM platforms and intrusion detection signatures. He also led large penetration tests and provided security consulting, compliance assessments, and incident response. Mezack holds patents for threat modeling and security information management technologies. He aims to further his skills while taking on leadership, individual contributor, or training responsibilities.
Information Security Officer Internet Resume Leon Blum CopyLblum1234
Leon Blum has over 20 years of experience in information security, technical support, and help desk management. He has worked for international banks and software companies. His experience includes managing user security administration, developing security monitoring systems, and implementing automated help desk systems. He has strong skills in operating systems, applications, networking, and security tools.
This document contains a resume for Devasis Kumar Mahato. It summarizes his work experience and qualifications. He has over 4 years of experience in information security and SIEM, currently working as a Team Lead for SOC Services at Paladion Networks in Bangalore, India. In this role, he performs security monitoring, incident response, and ArcSight administration. Previously he has also worked on security projects for several banks, enterprises, and other organizations. He holds technical certifications in CCNA and ArcSight administration.
This document contains the resume of Wasib Ahmed, an IT security professional with 5 years of experience implementing security solutions from Symantec and Intel Security. He has a bachelor's degree in computer engineering and numerous security-related certifications. His experience includes positions at ABM Info Tech as a system security engineer and at DWP Group Pakistan as an assistant technology consultant. He has implemented various security solutions for numerous clients across different industries.
Con8902 developing secure mobile applications-finalOracleIDM
This document discusses developing secure mobile applications. It provides an overview of Oracle Access Management which can be used to centrally manage mobile security. Oracle Access Management includes features for mobile security, social single sign-on, cloud access, and support for standards. It also provides client SDKs to help build security into native mobile apps and manages single sign-on. The document outlines a deployment architecture and is followed by a partner presentation and developer demo of Oracle's mobile security solution.
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
Office 365 Seguro? Sym, Cloud!
1-Estratégia de Segurança da Symantec
2-VIP & SAM for Office 365
3-DLP for Office 365
4-Email Security.cloud
Be Aware Webinar acontece todas as quartas às 10h30. Curta nossa página no Facebook e acompanhe a programação
Silviu Trofimov is an experienced information security professional with expertise in identity and access management, network security, cryptography, and data protection. He has over 20 years of experience designing and implementing security solutions for organizations. His technical skills include identity management, firewall management, PKI, next generation firewalls, and database security. He holds multiple security certifications.
Derek Mezack is an experienced security professional seeking a versatile role involving research, development, and training. He has extensive experience developing security solutions like SIEM platforms and intrusion detection signatures. He also led large penetration tests and provided security consulting, compliance assessments, and incident response. Mezack holds patents for threat modeling and security information management technologies. He aims to further his skills while taking on leadership, individual contributor, or training responsibilities.
Information Security Officer Internet Resume Leon Blum CopyLblum1234
Leon Blum has over 20 years of experience in information security, technical support, and help desk management. He has worked for international banks and software companies. His experience includes managing user security administration, developing security monitoring systems, and implementing automated help desk systems. He has strong skills in operating systems, applications, networking, and security tools.
This document contains a resume for Devasis Kumar Mahato. It summarizes his work experience and qualifications. He has over 4 years of experience in information security and SIEM, currently working as a Team Lead for SOC Services at Paladion Networks in Bangalore, India. In this role, he performs security monitoring, incident response, and ArcSight administration. Previously he has also worked on security projects for several banks, enterprises, and other organizations. He holds technical certifications in CCNA and ArcSight administration.
This document contains the resume of Wasib Ahmed, an IT security professional with 5 years of experience implementing security solutions from Symantec and Intel Security. He has a bachelor's degree in computer engineering and numerous security-related certifications. His experience includes positions at ABM Info Tech as a system security engineer and at DWP Group Pakistan as an assistant technology consultant. He has implemented various security solutions for numerous clients across different industries.
Con8902 developing secure mobile applications-finalOracleIDM
This document discusses developing secure mobile applications. It provides an overview of Oracle Access Management which can be used to centrally manage mobile security. Oracle Access Management includes features for mobile security, social single sign-on, cloud access, and support for standards. It also provides client SDKs to help build security into native mobile apps and manages single sign-on. The document outlines a deployment architecture and is followed by a partner presentation and developer demo of Oracle's mobile security solution.
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
Office 365 Seguro? Sym, Cloud!
1-Estratégia de Segurança da Symantec
2-VIP & SAM for Office 365
3-DLP for Office 365
4-Email Security.cloud
Be Aware Webinar acontece todas as quartas às 10h30. Curta nossa página no Facebook e acompanhe a programação
Mark Koehler is an experienced IT professional seeking a career growth opportunity in information technology. He has over 15 years of experience in security, network infrastructure, systems administration and management. His skills include security compliance, risk assessment, network design, systems management, and security system implementation. He is looking to contribute his skills and experience to help organizations succeed.
The document describes Oracle's identity platform and how it has evolved from individual tools and point solutions to a unified platform with shared services and intelligence capabilities. It outlines key components of Oracle's identity stack including identity governance, access management, and directory services. The platform provides a rationalized architecture that allows components to connect and work together through shared services. It also offers capabilities for actionable intelligence, extensibility, and deployment in cloud environments.
This document provides guidance for evaluating privileged access management solutions. It outlines best practices for constructing a lab environment to test features like replication across multiple nodes, automatic discovery and classification of managed systems, and traversing firewalls. The evaluation should focus on advanced elements like fault tolerance, scalability, workflows and the technical capabilities of the solution.
The document discusses advanced persistent threats and privileged identity challenges. It provides background on the speaker, including their qualifications and experience. It then covers topics like what privileged accounts are, how system administrators operate, insider threats, case studies of security breaches involving privileged accounts, and compliance and regulatory issues around privileged identity management. Solutions discussed include implementing policies, processes, and technology to better control and monitor privileged access.
Manean KVS is an information security specialist with 11 years of experience in network security and information security. He has expertise in vulnerability assessment, compliance audits, firewall configuration and management, intrusion detection systems, and forensics. He is proficient in security tools such as Nessus, Metasploit, Snort, and forensic tools. He has worked as a lead information security professional and conducted security audits, vulnerability assessments, penetration testing, and policy implementation for various organizations. He holds certifications like CEH, ITIL, and is a licensed penetration tester and ISMS auditor.
IBM Security Identity and Access Management - PortfolioIBM Sverige
The document provides an overview and update on IBM's Identity and Access Management products, including ISAM, ISIM, PIM, and Z/Secure. Key points discussed include:
- ISAM will support federated registry access and native Kerberos single sign-on.
- ISAM will integrate with Trusteer Pinpoint for endpoint security monitoring and policy enforcement.
- The ISAM appliance now includes SNMP for system monitoring and integration with tools like Tivoli Enterprise Monitoring.
- A converged security and integration solution is proposed using ISAM and DataPower Gateway capabilities in a single multi-channel gateway appliance.
- Identity Manager version 7.0 will be available only as a virtual appliance, providing a quicker
Csa summit who can protect us education for cloud security professionalsCSA Argentina
This document discusses the need for cloud security professionals and two new certifications: the Certificate of Cloud Security Knowledge (CCSK) and the Certified Cloud Security Professional (CCSP). It outlines the development and requirements for each certification, how they complement each other, and their value for candidates and organizations. The CCSK validates foundational cloud security knowledge, while the CCSP demonstrates advanced experience-based knowledge through work experience and passing an exam. Both certifications are intended to help information security professionals gain specialized cloud skills and validate their competency in securing cloud environments.
This resume summarizes the professional experience of an Information Security professional with over 13 years of experience implementing security standards like ISO27001, PCI-DSS, and SSAE 16. The candidate's current role involves automating security controls, managing audits, and leading a team as the IT-GRC Domain Area Lead Manager. Prior experience includes security roles at Bharti Airtel, Capco Technologies, and other companies managing security operations, audits, risk assessments, and projects.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
AboutWeb is a leading provider of technology solutions and services to government agencies and businesses since 1998. It offers innovation, technology solutions, experienced staff augmentation, and certified technology training. AboutWeb is a GSA IT solutions vendor and Microsoft certified partner with over 80 employees. It has experience as a prime and subcontractor on federal contracts and provides quality resources and solutions such as COTS integration, custom application development, web development, document management, and cyber security.
This document summarizes a presentation given by Ranjan Jain of Cisco and Michael Neuenschwander of Oracle about best practices for adopting a platform approach to identity and access management (IAM). The speakers discussed Cisco's business drivers for improving IAM, their rationale for choosing a platform over point solutions, and how they implemented Oracle's IAM products. They provided recommendations based on Cisco's experiences and highlighted potential benefits like cost savings and increased responsiveness compared to individual point solutions.
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...CA Technologies
In this age of an interconnected global business ecosystem, businesses rely on network connections with partners, suppliers, and others for efficient business processes. You just have to look at the headlines to see that several recent security breaches have compromised these connections as a way into a corporate network. Utilizing CA Advanced Authentication, CenterPoint Energy is making connections more secure through multi-factor authentication and reduce the risk of standard network credentials becoming compromised.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
how to secure web applications with owasp - isaca sep 2009 - for distributionSantosh Satam
This document discusses how to secure web applications using OWASP (Open Web Application Security Project). It recommends taking a systemic approach and implementing application security practices throughout the entire software development lifecycle (SDLC), from requirements to deployment. OWASP provides free tools, guides, and projects to help with tasks like threat modeling, code reviews, and vulnerability testing at each stage of the SDLC. Following OWASP best practices can help prevent security issues and ensure applications are secure before they go into production.
1. The document discusses 10 reasons why organizations may be ready for a secure managed cloud service, including wanting built-in security capabilities, customized service, and a proactive partner.
2. It describes what a managed cloud service entails and differentiates secure managed cloud services from typical cloud services. Secure managed cloud services take on more security responsibilities.
3. The best secure managed cloud services provide benefits like 24/7 monitoring and maintenance of cloud workloads, reduced costs, faster deployment times, unique capabilities, lower risk, and assistance with compliance requirements.
We will explore why the current industry approach to security is failing us. We will then discuss how building security as an architecture can raise the security level for any organization. An architectural approach is required to take security to the next level and defend against modern threats. We will discuss how you can use Cisco solutions to build a true security architecture.
Csa summit la transformación digital y el nuevo rol del cisoCSA Argentina
The document discusses the evolving role of the Chief Information Security Officer (CISO) in light of digital transformation trends like cloud computing, the Internet of Things, and mobile technology. It notes that CISOs now need to take a more strategic role focusing on skills development, adaptive security architectures, and extending security to new digital business models. The use of managed security services is also positioned as an opportunity for CISOs to help address skills shortages and the increasing complexity of securing modern IT infrastructures.
IBM MobileFirst Reference Architecture 1512 v3 2015Sreeni Pamidala
IBM MobileFirst Reference Architecture with Application architecture, deployment/operational models for developing Android/IoS/Web apps and host in the cloud
The document discusses compliance and certification in the public cloud. It introduces the Cloud Security Alliance's Open Certification Framework, which provides three levels of trust and assurance for cloud consumers. Level 1 is the CSA STAR registry, a public registry of cloud provider self-assessments. Level 2 is CSA STAR Certification, which evaluates a cloud provider's information security management system. Level 3 is CSA STAR Attestation, which is based on the AICPA SOC 2 attestation standard and provides assurance on a cloud provider's controls and processing. The framework aims to build trust between cloud providers and consumers through transparency, independent verification, and flexible, incremental certification.
Bruce O'Dell is an experienced IT consultant with over 20 years of experience in application, solution, security and enterprise architecture. He has expertise in strategic technology planning, application architecture, security architecture, performance engineering, and technology strategy. Some of his past roles include developing enterprise security frameworks, leading SOA implementations, and performing strategic assessments of technology portfolios.
This document is a resume for Joseph P. Keefe summarizing his education and 24 years of experience in systems engineering and management. It lists his BS in Applied Mathematics from Cal Poly SLO and graduate work at multiple universities. It then details his various roles managing computing facilities and infrastructure at universities and research institutions like UCSD and Intuit, with responsibilities including systems deployment, network engineering, and user support.
Mark Koehler is an experienced IT professional seeking a career growth opportunity in information technology. He has over 15 years of experience in security, network infrastructure, systems administration and management. His skills include security compliance, risk assessment, network design, systems management, and security system implementation. He is looking to contribute his skills and experience to help organizations succeed.
The document describes Oracle's identity platform and how it has evolved from individual tools and point solutions to a unified platform with shared services and intelligence capabilities. It outlines key components of Oracle's identity stack including identity governance, access management, and directory services. The platform provides a rationalized architecture that allows components to connect and work together through shared services. It also offers capabilities for actionable intelligence, extensibility, and deployment in cloud environments.
This document provides guidance for evaluating privileged access management solutions. It outlines best practices for constructing a lab environment to test features like replication across multiple nodes, automatic discovery and classification of managed systems, and traversing firewalls. The evaluation should focus on advanced elements like fault tolerance, scalability, workflows and the technical capabilities of the solution.
The document discusses advanced persistent threats and privileged identity challenges. It provides background on the speaker, including their qualifications and experience. It then covers topics like what privileged accounts are, how system administrators operate, insider threats, case studies of security breaches involving privileged accounts, and compliance and regulatory issues around privileged identity management. Solutions discussed include implementing policies, processes, and technology to better control and monitor privileged access.
Manean KVS is an information security specialist with 11 years of experience in network security and information security. He has expertise in vulnerability assessment, compliance audits, firewall configuration and management, intrusion detection systems, and forensics. He is proficient in security tools such as Nessus, Metasploit, Snort, and forensic tools. He has worked as a lead information security professional and conducted security audits, vulnerability assessments, penetration testing, and policy implementation for various organizations. He holds certifications like CEH, ITIL, and is a licensed penetration tester and ISMS auditor.
IBM Security Identity and Access Management - PortfolioIBM Sverige
The document provides an overview and update on IBM's Identity and Access Management products, including ISAM, ISIM, PIM, and Z/Secure. Key points discussed include:
- ISAM will support federated registry access and native Kerberos single sign-on.
- ISAM will integrate with Trusteer Pinpoint for endpoint security monitoring and policy enforcement.
- The ISAM appliance now includes SNMP for system monitoring and integration with tools like Tivoli Enterprise Monitoring.
- A converged security and integration solution is proposed using ISAM and DataPower Gateway capabilities in a single multi-channel gateway appliance.
- Identity Manager version 7.0 will be available only as a virtual appliance, providing a quicker
Csa summit who can protect us education for cloud security professionalsCSA Argentina
This document discusses the need for cloud security professionals and two new certifications: the Certificate of Cloud Security Knowledge (CCSK) and the Certified Cloud Security Professional (CCSP). It outlines the development and requirements for each certification, how they complement each other, and their value for candidates and organizations. The CCSK validates foundational cloud security knowledge, while the CCSP demonstrates advanced experience-based knowledge through work experience and passing an exam. Both certifications are intended to help information security professionals gain specialized cloud skills and validate their competency in securing cloud environments.
This resume summarizes the professional experience of an Information Security professional with over 13 years of experience implementing security standards like ISO27001, PCI-DSS, and SSAE 16. The candidate's current role involves automating security controls, managing audits, and leading a team as the IT-GRC Domain Area Lead Manager. Prior experience includes security roles at Bharti Airtel, Capco Technologies, and other companies managing security operations, audits, risk assessments, and projects.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
AboutWeb is a leading provider of technology solutions and services to government agencies and businesses since 1998. It offers innovation, technology solutions, experienced staff augmentation, and certified technology training. AboutWeb is a GSA IT solutions vendor and Microsoft certified partner with over 80 employees. It has experience as a prime and subcontractor on federal contracts and provides quality resources and solutions such as COTS integration, custom application development, web development, document management, and cyber security.
This document summarizes a presentation given by Ranjan Jain of Cisco and Michael Neuenschwander of Oracle about best practices for adopting a platform approach to identity and access management (IAM). The speakers discussed Cisco's business drivers for improving IAM, their rationale for choosing a platform over point solutions, and how they implemented Oracle's IAM products. They provided recommendations based on Cisco's experiences and highlighted potential benefits like cost savings and increased responsiveness compared to individual point solutions.
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...CA Technologies
In this age of an interconnected global business ecosystem, businesses rely on network connections with partners, suppliers, and others for efficient business processes. You just have to look at the headlines to see that several recent security breaches have compromised these connections as a way into a corporate network. Utilizing CA Advanced Authentication, CenterPoint Energy is making connections more secure through multi-factor authentication and reduce the risk of standard network credentials becoming compromised.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
how to secure web applications with owasp - isaca sep 2009 - for distributionSantosh Satam
This document discusses how to secure web applications using OWASP (Open Web Application Security Project). It recommends taking a systemic approach and implementing application security practices throughout the entire software development lifecycle (SDLC), from requirements to deployment. OWASP provides free tools, guides, and projects to help with tasks like threat modeling, code reviews, and vulnerability testing at each stage of the SDLC. Following OWASP best practices can help prevent security issues and ensure applications are secure before they go into production.
1. The document discusses 10 reasons why organizations may be ready for a secure managed cloud service, including wanting built-in security capabilities, customized service, and a proactive partner.
2. It describes what a managed cloud service entails and differentiates secure managed cloud services from typical cloud services. Secure managed cloud services take on more security responsibilities.
3. The best secure managed cloud services provide benefits like 24/7 monitoring and maintenance of cloud workloads, reduced costs, faster deployment times, unique capabilities, lower risk, and assistance with compliance requirements.
We will explore why the current industry approach to security is failing us. We will then discuss how building security as an architecture can raise the security level for any organization. An architectural approach is required to take security to the next level and defend against modern threats. We will discuss how you can use Cisco solutions to build a true security architecture.
Csa summit la transformación digital y el nuevo rol del cisoCSA Argentina
The document discusses the evolving role of the Chief Information Security Officer (CISO) in light of digital transformation trends like cloud computing, the Internet of Things, and mobile technology. It notes that CISOs now need to take a more strategic role focusing on skills development, adaptive security architectures, and extending security to new digital business models. The use of managed security services is also positioned as an opportunity for CISOs to help address skills shortages and the increasing complexity of securing modern IT infrastructures.
IBM MobileFirst Reference Architecture 1512 v3 2015Sreeni Pamidala
IBM MobileFirst Reference Architecture with Application architecture, deployment/operational models for developing Android/IoS/Web apps and host in the cloud
The document discusses compliance and certification in the public cloud. It introduces the Cloud Security Alliance's Open Certification Framework, which provides three levels of trust and assurance for cloud consumers. Level 1 is the CSA STAR registry, a public registry of cloud provider self-assessments. Level 2 is CSA STAR Certification, which evaluates a cloud provider's information security management system. Level 3 is CSA STAR Attestation, which is based on the AICPA SOC 2 attestation standard and provides assurance on a cloud provider's controls and processing. The framework aims to build trust between cloud providers and consumers through transparency, independent verification, and flexible, incremental certification.
Bruce O'Dell is an experienced IT consultant with over 20 years of experience in application, solution, security and enterprise architecture. He has expertise in strategic technology planning, application architecture, security architecture, performance engineering, and technology strategy. Some of his past roles include developing enterprise security frameworks, leading SOA implementations, and performing strategic assessments of technology portfolios.
This document is a resume for Joseph P. Keefe summarizing his education and 24 years of experience in systems engineering and management. It lists his BS in Applied Mathematics from Cal Poly SLO and graduate work at multiple universities. It then details his various roles managing computing facilities and infrastructure at universities and research institutions like UCSD and Intuit, with responsibilities including systems deployment, network engineering, and user support.
Este documento presenta el currículum vitae de Alexander Cerna Rivas, un ingeniero electrónico peruano con más de 20 años de experiencia en proyectos de telecomunicaciones e infraestructura de TI. Actualmente busca nuevas oportunidades laborales donde pueda aportar sus fortalezas como trabajador, líder, y su capacidad de análisis y trabajo en equipo.
Adam Green has over 8 years of experience in marketing, promotions, and production coordination for television networks such as HBO, STARZ, Freeform, and USA Network. He has worked as a social media content producer, post-production coordinator, executive assistant to CEO Chris Albrecht of STARZ, and assistant to acclaimed director Michael Mann on projects including the HBO series "Luck". Green has strong skills in customer service, content creation, leadership, and managing high-profile clients and productions.
This document is a resume for John C. Zancanaro. It summarizes his experience and qualifications. He has over 30 years of experience in IT, including roles as a systems administrator, network engineer, computer consultant, and senior network administrator. He has expertise in areas such as software and hardware troubleshooting, installation and configuration, strategic planning, web development, and process optimization.
The document is a resume for Joseph John Kish seeking a Director of Operations or Project Manager position. He has over 35 years of experience in construction management, development, and operations roles with a focus on commercial, residential, and mixed-use projects. His background includes responsibilities for securing entitlements, managing budgets, overseeing construction from start to finish, and ensuring quality and safety standards are met.
Pranav Sabane is a technology-oriented IT professional with 17 years of experience in IT operations, project management, and data centers. He is seeking a senior level role in IT operations, project management, or data centers. He has extensive experience managing teams and delivering IT services and support for large banking clients. Some of his key accomplishments include successfully setting up data centers and disaster recovery centers, managing infrastructure projects, and receiving an award for outstanding performance and being a best team player.
Sayan Pramanik has over 4.8 years of experience as a project lead managing complex IT projects. He has strong skills in project management, time management, team management, and client relationship management. Pramanik is proficient with various software, tools, servers, and operating systems. He holds an ITIL v3 Foundation certification and a bachelor's degree in mathematics. Pramanik is currently working as a project lead for Huawei in Chennai, where he manages a team of 54 members and ensures timely delivery of high-quality services to customers.
Michael Romolino is a highly motivated IT professional with over 30 years of experience managing infrastructure projects for Fortune 500 and small to mid-size clients. He has excellent problem solving skills and experience building relationships with global teams. His resume outlines roles providing consulting, management, and support services for various technologies and platforms at companies such as CA Technologies, Hewlett Packard, and Electronic Data Systems.
George Cordova is seeking long-term employment where he can grow professionally and enhance his skills. He has over 15 years of experience in telecommunications including roles as a Metro Field Support technician, Network Installation Technician, Tier II Telecom Technician, and Central Office Installer. His experience includes tasks such as site audits, fiber splicing, hardware installations, troubleshooting networks, and ensuring documentation accuracy. He has certifications in fiber splicing, telecommunications, and testing circuits with JDSU equipment.
Barbara Newman has over 30 years of experience in program/project management, systems administration, and information security. She currently works as a Project Manager at Boeing, where she manages projects involving data center modernization, server virtualization, and mainframe retirement. Previously she held systems administration and security roles at Boeing, Rockwell, and other defense contractors.
This document provides a summary of Rajasekhar's professional experience working with CA SiteMinder for over 2 years. It outlines his technical skills in Windows, Apache, IIS and CA SiteMinder 12.0/12.51. It also summarizes two projects involving implementing single sign-on across multiple applications and providing support for applications integrated with SiteMinder and Active Directory authentication.
This document provides a summary of Somnath Sinha's professional experience and qualifications. It outlines his 8+ years of experience in IT and 7+ years working with identity and access management technologies. It also lists his technical skills and roles managing teams of 2-9 people on projects in various domains for clients in Australia, USA, UK and India. Recent projects include using Oracle Identity Manager, Oracle Access Manager and Sailpoint for banking and government clients.
Prasad Sala has over 20 years of experience leading software development teams for regulatory reporting and credit risk management systems. He has extensive experience designing and developing applications using Java/J2EE technologies and has led teams implementing solutions for Basel II/III, CCAR, DFAST, and other regulatory reporting requirements. Currently he is a Team Lead at HSBC developing technology solutions to support their regulatory business group.
Shan has over 20 years of experience in IT with expertise in Java, web services, security, and cloud technologies. He has worked as a solutions architect, developer, and technical lead for companies such as Apple, Wells Fargo, and Sun Microsystems. His skills include web application development, API design, and implementing OAuth, WS-Security, and other standards.
The document is a CV for Pragatheswarakumar K. It summarizes his professional experience including over 5 years of experience in software development using Java and related frameworks. It lists his skills in areas like Spring, AngularJS, RabbitMQ, Android development, and his past roles including senior software engineer roles at SecureW2 India Pvt Ltd and Cluster Wireless Software India Pvt Ltd developing microservices, web applications, and middleware. It also provides his educational qualifications and hobbies.
Sachin BC is a senior software engineer with over 7 years of experience seeking a career opportunity. He has extensive experience developing applications for JP Morgan Chase and Goldman Sachs using technologies like Java, Spring, JavaScript and databases like MySQL and Oracle. His responsibilities included full-stack development, testing, production support and requirement gathering.
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
The document discusses API security challenges in modern enterprises driven by cloud and mobility. It outlines Oracle's approach to API management and security which includes: (1) treating the enterprise web as consisting of APIs, (2) addressing the same security problems around DMZ security, access control, and insider threats but with new names, (3) enabling better security through service abstraction and standards-based layers for access control. It then provides examples of Oracle's API gateway and identity management solutions for securing APIs.
This resume summarizes Dhayanithi R's work experience, skills, education, and projects. They have over 11 years of experience in software development, design, maintenance, and leading technical teams. Their skills include languages like Java, C++, databases like Oracle and SQL, and frameworks like Spring. They have worked on projects for clients in various industries including retail, banking, and healthcare. Their roles have included solutions architect, development lead, and project management.
The document provides a summary of Naresh's professional experience in IT including over 7 years working with infrastructure, applications support, and maintenance on client server and legacy systems. It details his experience with technologies such as Oracle Identity Manager, WebLogic, Linux, and various web servers. It also lists his areas of expertise, employment history with various companies, and academic credentials.
Dhiraj Kalra provides his contact information and an extensive professional summary highlighting over 17 years of experience in software development roles such as project manager, project lead, and senior software engineer. His skills include ASP.net, C#, Java, SQL, and SharePoint technologies. He then lists recent projects in document tracking systems, intranet portals, and other areas for clients in various industries.
Ahmad Owais is a senior technical specialist with over 11 years of experience in Java/J2EE development, system design, architecture, and consulting. He has skills in technologies such as Java, XML, JSP, Servlets, Struts, Spring, Hibernate, Web Services, JMS, Oracle, MySQL, Flex, HTML, JavaScript, and more. He has contributed to projects involving middleware technologies, ecommerce portals, configuration and ordering systems, and more.
An extremely motivated and proficient individual with 4 years of experience in Build/ Release with DevOps & Development, AWS CSA, MCSE(Azure) and JIRA Administrator in IT industry.
The document provides a summary of Mohammed Yaseen Dandeli's professional experience and qualifications. It outlines over 14 years of experience developing applications using Microsoft technologies, including experience as a project lead, technical architect, and individual contributor on web and client-server applications. It also lists technical skills and certifications, as well as examples of projects led and worked on in various roles.
Deepti Sharma has over 7 years of experience in manual and performance testing. She currently works as a Senior Quality Assurance Engineer for Tech Mahindra, where she tests AT&T retail projects using both waterfall and agile methodologies. She has extensive experience in various types of testing including manual testing, performance testing, database testing, and more. She also has experience managing teams of over 20 people.
This document contains the resume summary of Saptalopa Routray. It outlines his 9 years of experience in Java technologies including Java 1.5, 6, and 7. It also lists his educational qualifications including a Masters in Information Technology and certifications including SCJP 1.5. It provides details of 6 projects he has worked on spanning multiple domains like property management, telecom, and banking. The projects utilized technologies like Java, EJB, Hibernate, Spring and databases like Oracle, SQL Server and Informix. It also includes his work experience and skill sets.
This document contains contact and background information for Ramkumar MK, including his educational qualifications, 14+ years of experience in software development, management experience, technical skills including languages, frameworks, databases, and tools. It lists 7 key projects he has worked on in various roles, primarily as a technical architect or manager, for companies in industries such as banking, insurance, telecom, and media.
1. Prakhar Sood
Currently Working with Pramerica Systems as Sr Security Architect.
Past Employment CA Technologies as Principal Identity and Access Management
Engineer, SDG Corporation & TCS (Tata Consultancy Services Limited)
Email : sood.prakhar@gmail.com, Phone : Contact # +353 (0) 894581105
Experience Summary
• Currently working with Pramerica Systems Ireland as a Senior Specialist Architect in their
Architecture and Engineering team (AT&E), designing the CA Advanced Security &
Identity Manager solution along with Tivoli FIM & Apigee Edge managing a team of 20+
Engineers within the IAM Architecture team in Ireland & US.
• Customization of the CA Advance Authentication Solution to fulfil client requirements.
• Implementation of CA Privileged Access Manager (formerly Xceedium) in the
Infrastructure Security space.
• Previously working with CA Technologies as a Principal Security Engineer / Architect
handling a team of 11 Engineers and handling critical escalations/issues of various
clients on their Siteminder SSO, Federation, CA IDM ( Identity Minder ), PIM ( Access
Control ), RCM, CloudMinder & Layer 7 Security Product Suite for 4+ years.
• Sr. Software Engineer past working with SDG Noida for GE SSO Integration Project for
last 2+ years on CA Siteminder, Oracle Access Manager (OAM), ForgeRock OpenAM
and Ping Federation .
• Associate with 1 years and 6 month of experience in development and maintenance with
Tata Consultancy Services.
• IAM Architecture, Design, Implementation, Consulting, Development Security
Management.
• Sun Certified Training on Oracle/SUN IDM and hands-on experience on same .
• Strong and field of interest in Oracle , PL/SQL, Core Java, J2EE, Unix, Perl/Shell
Scripting.
• Will be comfortable with any project with a little project specific training.
Technology:
Below is a list of important software products, tools and technologies that I have worked
with.
Identity and Access Management
Tools:
Softwares Tools
2. • CA Siteminder
• CA Strong Authentication
• CA Risk Authentication
• CA Identity Minder (IDM)
• CA Federation Manager
• Tivoli FIM
• CA Secure Proxy Server
• CA Layer 7 ( API Gateway )
• APIGEE Edge
• CA Cloudminder
• CA Access Control (PIM)
• CA PAM / Xceedium
• Oracle Access Manager (OAM)
• Ping Federate
• Forgerock OpenAM
• Oracle/Sun IDM
• OpenID Connect
• OAuth
• Linux, Solaris,
Windows OS
• Webservers:
Apache, IIS,
Iplanet, Domino
• Application Servers:
JBOSS, Servlet
Exec, Tomcat
• LDAP: AD, AD LDS
Oracle LDAP,
Novell DS, CA DS,
IBM DS
• DB: MSSQL,
Oracle, MySQL,
DB2
• Service Cloud
• Fiddler 2
• Wireshark
• SAML Authn
Encoder/Decoder
• SQL Developer
• BMC Patrol
• Remedy
• Sitescope
• Keynote
• Kintana
• Star Client
• SOAPUI
• RESTMON
Qualifications
Degree and Date Institute Major and Specialization
Bachelor of Engineering,
June 2008( 70.4%)
Awarded First Class with
Distinction
Sinhgad College of Engineering,
Pune University
Information Technology
Intermediate,
June 2004 (77.8.0%)
Dewan Public School, Meerut , Uttar
Pradesh
Physics, Chemistry,
Mathematics
HSC May 2002 (74.4%) Dewan Public School, Meerut , Uttar
Pradesh
All Streams
Other Technical Skills & certifications:
o Operating system: Linux, Solaris, Windows(2003, 2008, 2012)
3. o Special Software : Siteminder all versions, Federation, IDM, SPS, Layer 7
o Programming Languages: Pl/Sql, C++, Java, J2EE, Shell scripting, Unix,
XML,HTML
Professional Memberships / Certifications
Professional Society / Certification
Internal ITIL V3 Certified
CA Siteminder R12.5 Certified
CA Federation R12.5 Certified
CA Identity Manager R12.6 Certified
Assignments
The details of the various assignments that I have handled are listed here.
Project Prudential Architecture & Engineering Team
Client Prudential Financial
Duration Nov-2015 – Till Date
Description - Designing current Security solution using CA products
- Implementation CA Strong Authentication from scratch for multiple
Business Units at Prudential
- Implementation of CA Identity Manager from scratch for Prudential Users.
- Self Service Configuration on Windows endpoint agents.
- Implementation of CA Privileged Access Manager (formerly Xceedium) in
the Infrastructure Security space.
- Upgrading Siteminder infrastructure from R12.0SP3 to R12.52
- Implementation of new connections in TFIM with new Federated partners.
- Creating policies and publishing APIs in APIGEE Edge
- Integration of third-party products like Clickatell & Twilio for SMS
configuration to be used for OTP.
- Creating Project Plans and Architecture Diagrams
Role Sr Specialist Architect
Solution
Environment CA Strong Authentication, CA Riskminder, CA Siteminder, CA Identity Manager,
Apigee Edge, TFIM, IBM DS, DB2, Visio, MPP
Project Siteminder Support Team
Client CA Technologies Worldwide
Duration Sep-2011 – Oct-2015
Description - Working with the Global CA Security Team on handling critical client
escalations on all CA Security and API Management products.
- Gold Partner for 2 major CA clients Shell EU (Cloudminder) & ANZ Bank
Australia (Siteminder).
- Leading a strong team of 12 Security Support Engineers and providing
training on latest releases.
- Active part of the Product Management team and providing suggestions
and feedback on product enhancements and supportability.
- Handling issues and escalations on CA Layer 7 API Gateway.
- Working on CA Siteminder, CA Federation, CA Secure Proxy Server, CA
Identity Manager (IDM), CA Strong Authentication, CA Risk
Authentication, CA Cloudminder, CA Privileged Identity Manager (PIM)
and handling critical escalations for the same.
4. - Conducting trainings for the CA Education team for customers on all the
above mentioned products.
- Providing end to end Escalation support for all Siteminder customers
worldwide on all flavors of CA Identity & Access Management & API
Management.
Role Principal Software Engineer
Solution
Environment CA Siteminder, Federation Security Services, Federation Manager, SPS, Layer 7
SSG Gateway, API Portal, CA IDM, CA PIM, CA CloudMinder, CA Strong
Authentication, CA Risk Authentication.
Project Single Sign On Integration Team, SDG Software
Client GE General Electric ,USA
Duration May-2010 – Sep-2011
Description This is for maintenance and support of SSO. This project can be used to access
of all the application of GE by using only single user name and password. Single
Sign-On (SSO) is a utility jointly developed by the Information Technologies (IT)
and Interactive Enterprise Development (IED) groups. The SSO utility provides
security to web based applications. In doing so, it enables the use of a single
User ID for a customer to access all participating GE web sites
Role Team Member
Solution
Environment
Sun Solaris, Unix ,Linux, iplanet, IIS, Windows Boxes,JAVA/J2EE,Shell scripting
Oracle,Siteminder 6.0, 12.0, SUN IDM, LDAP, Ping Federate, OpenAM & OAM
Tools
Currently handling installation of Siteminder Web Agents, Deploying Siteminder
on various applications and different environments and troubleshooting SSO
Issues.
Highlights Handling an Implementation Team of Siteminder/IDM and onboarding
applications.
Responsibilities - Implementation of CA Siteminder R6 and R12 across the GE Corporate
- Onboarding new applications on different webserver platforms
- Integration of Siteminder with third-party products like Jira & Teamsite.
- Creating new connections with third-party Federated applications using
Ping Federate
- Test POC for Forgerock OpenAM & Oracle Access Manager
- Resolve issues related to Siteminder with applications integrated with
SSO Involved in getting permanent fix.
- Work with Global teams to collaborate and document best policies for
onboarding new applications.
Project Single Sign On, Tata Consultancy Services (TCS)
Client American Express Technologies, Phoenix, USA
Duration Nov-2008 – Apr-2010
Description This is for maintenance and support of SSO. This project can be used to access of all
the application of American Express Bank by using only single user name and
password. Single Sign-On (SSO) is a utility jointly developed by the Information
Technologies (IT) and Interactive Enterprise Development (IED) groups. The SSO
utility provides security to web based applications. In doing so, it enables the use of a
5. single User ID for a customer to access all participating American Express web sites
Role Team Member
Solution
Environment
Sun Solaris, Unix ,Linux Boxes, JAVA/J2EE,Shell scripting Oracle, Siteminder, SUN
IDM,LDAP
Tools Eclipse, SQL Developer, BMC Patrol, SUN IDM, Sitescope, Keynote
Highlights Team Member of the IAM Support Team
Responsibilities - Estimation, Impact Analysis and Coding for various Change Requests
- Provided Backup lead maintenance from offshore
- Maintaining Siteminder 6.0, SUN IDM, Policy servers, Web servers and
Application servers.
- Managing all the day-to-day activities and to keep up the application
availability (99.91%) and performance(< 3.5 seconds) as per SLA
- ITIL process mapping and SSO service catalogue development
- To troubleshoot the issues related to Distributed Security Services (DSS) and
fix the same.
- Resolve issues related to Siteminder with applications integrated with SSO
Involved in getting permanent fix done in order to reduce the number of sev3
category IMRs.
Career Profile
Dates Organization Role
02/11/2015 - Till Date Pramerica Systems Technical Architect
21/09/2011 - 16/10/2015 CA Technologies Sr. Team Lead
01/05/2010 -10/09/2011 SDG Corporation Team Lead
10/11/2008 -16/04/2010 TATA Consultancy Services Team Member ( Back up lead) of
SSO Project of American
Express Bank
Training / Continuing Education Summary
Project Enhancement of CSS Portal
Customer American Express Technologies, Phoenix ,USA
Duration Done
Description This is for enhancement of CSS Portal. This project can be used to get even a single
information of all the issues and details of project since started.
Enhancement
Done
o Added a number of application in the system by changing and
enhancing the code at every tier.
o Added the functionality to get the availability of all applications in the
CSS Portal.
Role CSS Portal Enhancement Owner
Solution
Environment
JAVA/J2EE , Oracle
Tools Eclipse, SQL Developer
Highlights Performed nicely and got couple of rewards for good work and became
owner of CSS Portal Enhancement
6. Program or Course Coverage Dates
Initial Learning Program
of TCS
Software Engineering, Operating
System, Java 1.5, J2EE1.3,Oracle
10g
Nov 2008 to Feb 2009
SUN Certified Training in
SUN Identity Manger.
SUN IDM( Identity Manager) Dec 2009
Trainings conducted
Program or Course Presented to Location
Single Sign On Architecture American Express SSO Team Bangalore
Identity Manager American Express SSO Team Bangalore
CA Siteminder SDG SSO Team Noida
CA Siteminder R12.5 CA Education for Customers Hyderabad
CA Federation Manager CA Siteminder Support Team USA
CA Secure Proxy Server CA Siteminder Support Team Hyderabad
CA Layer 7 CA Global Services Team Hyderabad
CA Riskminder Prudential Security Team Ireland
CA IDM Integration Prudential Security Team Ireland
CA Security Solution Integration Prudential Security Team Ireland
Achievements
7. Achievements • BVPA Award for rolling out CA Advanced Authentication
successfully in Prudential within their GI BU.
• VIP Award for Implementation of Windows Password Reset using
CA Identity Manager Credential Manager for Windows across
Prudential and saving daily Customer Office calls for Password
Resets significantly
• Promoted to Prinicipal IAM Security Engineer at CA Technologies
• Got 2 Star award thrice in CA Technologies for Outstanding Project
Execution & Customer Service.
• Awarded 2 Star Award for Delighting Customers
• Awarded 2 Star Award for Imrpoving Customer Satisfaction
• Awarded 1 Star Award for achieving High IRD
• Awarded 2 Star Award for Reducing the EMEA Issue Backlog
• Awarded 1 Star Award for Taking High load during Peak Issue
Volume
• Awarded 1 Star Award for Training new joiners within the team
• Awarded 1 Star Award for High CSAT in the month of Nov-2014
• Also got awarded with lot of Team Competition prizes for reducing
the MTTR and Improving Customer Satisfaction as a Team
(Ocean’s 16 & Falcons)
• Customer Service Excellence Award for Delighting CA’s customers.
• Above and Beyond Award for handling Major Escalation worth a big
renewal deal worth $300 Million for CA
• Best performer in the Stream Training Batch of Oracle-PL/SQL.
• ILP Trivandrum Rating 4.9/5
• BE-I.T from Pune University with Distinction.
• Got Certificate of Appreciation from Project Senior Management for
doing good work in CSS Portal Enhancement and Capacity
Planning initiative.
• Community Champion for CA Security Communities
Extra-Curricular
Extra-
Curricular
• Headed Sponsorship for the event OSIRIS.
• Event Organizer for TRANSCEND.
• Arranged an Organization Level Event for Project Domain.
• Basketball Team Player for CA Technologies team.
• Badminton Team for Pramerica
Personal Details
Date of Birth 01-Nov-1986
Nationality Indian
Hobby Playing Basket Ball, Watching Movies, Singing
Passport Details
Name as on Passport Passport Number
Prakhar Sood J8513911